General

  • Target

    e27af27d3ea6bbea4bb1dac1dd69c705_JaffaCakes118

  • Size

    153KB

  • Sample

    240915-pnjs7stcla

  • MD5

    e27af27d3ea6bbea4bb1dac1dd69c705

  • SHA1

    6182f640ca9471148c1487e859a615e45d9213dc

  • SHA256

    94497f815bd3aa5616dd13898dbf698fcc76a08c5eddcae5252369b61a106bd7

  • SHA512

    c07c6fde00982d74ef5454cb8de87cb48fc706cfffbbcf15c3b414d7cba5dcbdc5cdba69555c3a8b51a01850c5278893f4ca16d268c4f16b310a08f49d8bac3f

  • SSDEEP

    1536:9LB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5p+a9ojbs7zWLEKa:N22TWTogk079THcpOu5UZp7yLda

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://syracusecoffee.com/customer/jzN/

exe.dropper

http://intrasistemas.com/cgi-bin/6/

exe.dropper

http://rocketviral.com/bv/O/

exe.dropper

http://shop.homenhealthy.com/wp-includes/xt/

exe.dropper

http://raintoday.org/wp-admin/e/

exe.dropper

https://qualitychildcarepreschool.com/emqblk/292416929446266/O/

exe.dropper

http://thammynhp.com/wp-includes/H/

Targets

    • Target

      e27af27d3ea6bbea4bb1dac1dd69c705_JaffaCakes118

    • Size

      153KB

    • MD5

      e27af27d3ea6bbea4bb1dac1dd69c705

    • SHA1

      6182f640ca9471148c1487e859a615e45d9213dc

    • SHA256

      94497f815bd3aa5616dd13898dbf698fcc76a08c5eddcae5252369b61a106bd7

    • SHA512

      c07c6fde00982d74ef5454cb8de87cb48fc706cfffbbcf15c3b414d7cba5dcbdc5cdba69555c3a8b51a01850c5278893f4ca16d268c4f16b310a08f49d8bac3f

    • SSDEEP

      1536:9LB445TEgrO3jSWAg83tle1ZZ0293QM0eetR2cOupLB5UZ5p+a9ojbs7zWLEKa:N22TWTogk079THcpOu5UZp7yLda

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks